[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3369412.3395065acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article
Public Access

Turning Cost-Based Steganography into Model-Based

Published: 23 June 2020 Publication History

Abstract

Abstract Most modern steganographic schemes embed secrets by minimizing the total expected cost of modifications. However, costs are usually computed using heuristics and cannot be directly linked to statistical detectability. Moreover, as previously shown by Ker at al., cost-based schemes fundamentally minimize the wrong quantity that makes them more vulnerable to knowledgeable adversary aware of the embedding change rates. In this paper, we research the possibility to convert cost-based schemes to model-based ones by postulating that there exists payload size for which the change rates derived from costs coincide with change rates derived from some (not necessarily known) model. This allows us to find the steganographic Fisher information for each pixel (DCT coefficient), and embed other payload sizes by minimizing deflection. This rather simple measure indeed brings sometimes quite significant improvements in security especially with respect to steganalysis aware of the selection channel. Steganographic algorithms in both spatial and JPEG domains are studied with feature-based classifiers as well as CNNs.

References

[1]
P. Bas, T. Filler, and T. Pevný. Break our steganographic system -- the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, volume 6958 of rmLecture Notes in Computer Science, pages 59--70, Prague, Czech Republic, May 18--20, 2011.
[2]
M. Boroumand, M. Chen, and J. Fridrich. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 14(5):1181--1193, May 2019.
[3]
C. Cachin. An information-theoretic model for steganography. Information and Computation, 192(1):41--56, July 2004.
[4]
T. Denemark, M. Boroumand, and J. Fridrich. Steganalysis features for content-adaptive JPEG steganography. IEEE Transactions on Information Forensics and Security, 11(8):1736--1746, August 2016.
[5]
T. Denemark and J. Fridrich. Improving selection-channel-aware steganalysis features. In A. Alattar and N. D. Memon, editors, Proceedings IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2016, San Francisco, CA, February 14--18, 2016.
[6]
T. Denemark, J. Fridrich, and V. Holub. Further study on the security of S-UNIWARD. In A. Alattar, N. D. Memon, and C. Heitzenrater, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, volume 9028, pages 05 1--13, San Francisco, CA, February 3--5, 2014.
[7]
T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich. Selection-channel-aware rich model for steganalysis of digital images. In IEEE International Workshop on Information Forensics and Security, Atlanta, GA, December 3--5, 2014.
[8]
T. Filler and J. Fridrich. Fisher information determines capacity of ε-secure steganography. In S. Katzenbeisser and A.-R. Sadeghi, editors, Information Hiding, 11th International Conference, volume 5806 of rmLecture Notes in Computer Science, pages 31--47, Darmstadt, Germany, June 7--10, 2009. Springer-Verlag, New York.
[9]
T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, 6(3):920--935, September 2011.
[10]
J. Fridrich and J. Kodovský. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 7(3):868--882, June 2011.
[11]
J. Fridrich and J. Kodovský. Multivariate Gaussian model for designing additive distortion for steganography. In Proc. IEEE ICASSP, Vancouver, BC, May 26--31, 2013.
[12]
L. Guo, J. Ni, and Y.-Q. Shi. An efficient JPEG steganographic scheme using uniform embedding. In Fourth IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, December 2--5, 2012.
[13]
L. Guo, J. Ni, and Y. Q. Shi. Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security, 9(5):814--825, May 2014.
[14]
V. Holub. Content Adaptive Steganography -- Design and Detection. PhD thesis, Binghamton University, May 2014.
[15]
V. Holub and J. Fridrich. Designing steganographic distortion using directional filters. In Fourth IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, December 2--5, 2012.
[16]
V. Holub, J. Fridrich, and T. Denemark. Universal distortion design for steganography in an arbitrary domain. EURASIP Journal on Information Security, Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, 2014:1, 2014.
[17]
A. D. Ker. Estimating steganographic fisher information in real images. In S. Katzenbeisser and A.-R. Sadeghi, editors, Information Hiding, 11th International Conference, volume 5806 of rmLecture Notes in Computer Science, pages 73--88, Darmstadt, Germany, June 7--10, 2009. Springer-Verlag, New York.
[18]
A. D. Ker and R. Böhme. Revisiting weighted stego-image steganalysis. In E. J. Delp, P. W. Wong, J. Dittmann, and N. D. Memon, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 5 1--17, San Jose, CA, January 27--31, 2008.
[19]
A. D. Ker, T. Pevný, and P. Bas. Rethinking optimal embedding. In F. Perez-Gonzales, F. Cayre, and P. Bas, editors, The 4th ACM Workshop on Information Hiding and Multimedia Security, pages 93--102, Vigo, Spain, June 20--22, 2016. ACM Press.
[20]
J. Kodovský and J. Fridrich. On completeness of feature spaces in blind steganalysis. In A. D. Ker, J. Dittmann, and J. Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 123--132, Oxford, UK, September 22--23, 2008.
[21]
J. Kodovský, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 7(2):432--444, April 2012.
[22]
S. Kouider, M. Chaumont, and W. Puech. Adaptive steganography by oracle (aso). In 2013 IEEE International Conference on Multimedia and Expo (ICME), pages 1--6, San Jose, CA, July 15--19, 2013.
[23]
B. Li, M. Wang, and J. Huang. A new cost function for spatial image steganography. In Proceedings IEEE, International Conference on Image Processing, ICIP, Paris, France, October 27--30, 2014.
[24]
V. Sedighi, R. Cogranne, and J. Fridrich. Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security, 11(2):221--234, 2016.
[25]
V. Sedighi, J. Fridrich, and R. Cogranne. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model. In A. Alattar and N. D. Memon, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, volume 9409, San Francisco, CA, February 8--12, 2015.
[26]
V. Sedighi, J. Fridrich, and R. Cogranne. Toss that BOSSbase, alice! In A. Alattar and N. D. Memon, editors, Proceedings IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2016, San Francisco, CA, February 14--18, 2016.
[27]
C. E. Shannon. Coding theorems for a discrete source with a fidelity criterion. IRE Nat. Conv. Rec., 4:142--163, 1959.
[28]
X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang. Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In P. Comesana, J. Fridrich, and A. Alattar, editors, 3rd ACM IH&MMSec. Workshop, Portland, Oregon, June 17--19, 2015.
[29]
W. Tang, B. Li, S. Tan, M. Barni, and J. Huang. Cnn-based adversarial embedding for image steganography. IEEE Transactions on Information Forensics and Security, 14(8):2074--2087, 2019.
[30]
W. Tang, H. Li, W. Luo, and J. Huang. Adaptive steganalysis based on embedding probabilities of pixels. IEEE Transactions on Information Forensics and Security, 11(4):734--745, April 2016.
[31]
J. Ye, J. Ni, and Y. Yi. Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security, 12(11):2545--2557, November 2017.

Cited By

View all
  • (2023)A review of Content Adaptive Image Steganography methodsSignal and Data Processing10.61186/jsdp.20.3.14120:3(141-182)Online publication date: 1-Dec-2023
  • (2023)Side-Informed Steganography for JPEG Images by Modeling Decompressed ImagesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.326888418(2683-2695)Online publication date: 2023
  • (2023)Search for Image Steganographic Policy With Adversary and Auxiliary Constrained Distance MeasureIEEE Access10.1109/ACCESS.2022.316466611(15896-15908)Online publication date: 2023
  • Show More Cited By

Index Terms

  1. Turning Cost-Based Steganography into Model-Based

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IH&MMSec '20: Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security
    June 2020
    177 pages
    ISBN:9781450370509
    DOI:10.1145/3369412
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 June 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. costs
    2. fisher information
    3. model-based
    4. steganalysis
    5. steganography

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    IH&MMSec '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)89
    • Downloads (Last 6 weeks)29
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)A review of Content Adaptive Image Steganography methodsSignal and Data Processing10.61186/jsdp.20.3.14120:3(141-182)Online publication date: 1-Dec-2023
    • (2023)Side-Informed Steganography for JPEG Images by Modeling Decompressed ImagesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.326888418(2683-2695)Online publication date: 2023
    • (2023)Search for Image Steganographic Policy With Adversary and Auxiliary Constrained Distance MeasureIEEE Access10.1109/ACCESS.2022.316466611(15896-15908)Online publication date: 2023
    • (2023)A secure adaptive Hidden Markov Model-based JPEG steganography methodMultimedia Tools and Applications10.1007/s11042-023-17152-583:13(38883-38908)Online publication date: 6-Oct-2023
    • (2022)Fighting the Reverse JPEG Compatibility Attack: Pick your SideProceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security10.1145/3531536.3532955(113-121)Online publication date: 23-Jun-2022
    • (2022)Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image SteganographyIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2022.314840632:8(5110-5123)Online publication date: Aug-2022
    • (2022)Graph Representation Learning for Spatial Image Steganalysis2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)10.1109/MMSP55362.2022.9948752(1-5)Online publication date: 26-Sep-2022
    • (2022)Improved Steganography Based on Referential Cover and Non-symmetric Embedding2022 IEEE 5th International Conference on Electronics Technology (ICET)10.1109/ICET55676.2022.9824286(1202-1206)Online publication date: 13-May-2022
    • (2021)Finding the Better Distortion Function from Prior Scheme for Image SteganographyAdvances in Artificial Intelligence and Security10.1007/978-3-030-78621-2_19(244-253)Online publication date: 29-Jun-2021
    • (2020)A Novel Grayscale Image Steganography Scheme Based on Chaos Encryption and Generative Adversarial NetworksIEEE Access10.1109/ACCESS.2020.30211038(168166-168176)Online publication date: 2020

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media